Risk Based Multi-Objective Security Control and Congestion Management Fei Xiao Iowa State University
Total Page:16
File Type:pdf, Size:1020Kb
Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 2007 Risk based multi-objective security control and congestion management Fei Xiao Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Electrical and Electronics Commons Recommended Citation Xiao, Fei, "Risk based multi-objective security control and congestion management" (2007). Retrospective Theses and Dissertations. 15848. https://lib.dr.iastate.edu/rtd/15848 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Risk based multi-objective security control and congestion management by Fei Xiao A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Electrical Engineering Program of Study Committee: James D. McCalley, Major Professor Chen-Ching, Liu William Q. Meeker Ajjarapu Venkataramana Sarah M. Ryan Iowa State University Ames, Iowa 2007 Copyright © Fei Xiao, 2007. All rights reserved. UMI Number: 3291683 Copyright 2007 by Xiao, Fei All rights reserved. UMI Microform 3291683 Copyright 2008 by ProQuest Information and Learning Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest Information and Learning Company 300 North Zeeb Road P.O. Box 1346 Ann Arbor, MI 48106-1346 ii TABLE OF CONTENTS LIST OF FIGURES ..............................................................................vii LIST OF TABLES..................................................................................x ACKNOWLEDGEMENTS ....................................................................xi ABSTRACT .........................................................................................xii CHAPTER 1: INTRODUCTION ..........................................................1 1.1 Power System Security Definition.......................................................... 1 1.2 Power System Security Assessment ..................................................... 3 1.2.1 Deterministic Approach................................................................ 3 1.2.2 Probabilistic Approach................................................................. 5 1.3 Security Control and Optimization......................................................... 6 1.3.1 Power System Control.................................................................. 6 1.3.2 Security Constrained Optimization ............................................. 8 1.3.3 Optimization Methods Summary ................................................. 9 1.4 Enhancing Market Security Based on Price Signal ............................ 12 1.5 Problem Statement ................................................................................ 13 1.6 Dissertation Organization ..................................................................... 16 CHAPTER 2: AN OVERVIEW OF RISK BASED SECURITY ASSESSMENT...........................................................................18 2.1 Introduction............................................................................................ 18 2.2 Architecture of Risk Based Security Assessment.............................. 20 2.3 Contingency Screening......................................................................... 24 2.3.1 Literature Overviews of Contingency Screening ..................... 24 2.3.2 Proposed Screening Approach.................................................. 26 2.3.3 Contingency Screening for Overload and Low Voltage .......... 27 iii 2.3.4 Contingency Screening for Voltage Instability......................... 29 2.3.5 Test Result................................................................................... 29 2.4 Operational Risk Measurement ............................................................ 33 2.4.1 General Definition of Risk .......................................................... 33 2.4.2 Low Voltage Risk ........................................................................ 37 2.4.3 Overload Risk.............................................................................. 37 2.4.4 Voltage Instability Risk............................................................... 38 2.4.5 Cascading Risk ........................................................................... 39 2.5 Risk Monitoring and Visualization........................................................ 40 2.6 Risk Identification for Security Control ............................................... 43 CHAPTER 3: COMPUTATION OF CONTINGENCY PROBABILITY FOR ONLINE OPERATION..............................44 3.1 Introduction............................................................................................ 44 3.2 Criteria Review....................................................................................... 46 3.3 Model Improvement for Operational Decisions .................................. 48 3.4 Pooling Data and Associated with Statistical Methods...................... 49 3.4.1 Pooling Data for Performance Analysis.................................... 49 3.4.2 Failure Rate Estimation for Each Pool ...................................... 50 3.5 Failure Rate Calculation Related to Weather....................................... 52 3.5.1 Why Choose Regression Analysis ............................................ 52 3.5.2 Applying Multiple Linear Regression ........................................ 53 3.5.3 Hypothesis Testing ..................................................................... 54 3.6 Calculation Procedure........................................................................... 55 3.7 Illustrative Example ............................................................................... 57 3.8 Summary ................................................................................................ 62 CHAPTER 4: RISK BASED SECURITY CONTROL DESIGN.........63 4.1 Introduction............................................................................................ 63 4.2 Formulation of Risk Based Multi-objective Optimization................... 67 4.3 Basic Properties of Multi-objective Optimization Problem ................ 70 iv 4.3.1 Single and Multi-objective Optimization ................................... 70 4.3.2 Concept of Domination............................................................... 72 4.3.3 Pareto-Optimality ........................................................................ 73 4.3.4 Finding Efficient Solutions......................................................... 74 4.3.5 Non-Dominated Sorting of a Population ................................... 75 4.3.6 Approaches to Multi-objective Optimization ............................ 76 4.4 Introduction of Multi-criterion Decision Making Methods.................. 78 4.4.1 Value or Utility–based Approaches ........................................... 78 4.4.2 ELECTRE IV................................................................................. 79 4.4.3 Evidential Theory ........................................................................ 79 4.4.4 Promethee ................................................................................... 80 4.4.5 Goal Programming...................................................................... 80 4.4.6 Lexicographic Method ................................................................ 80 4.4.7 Interactive approach ................................................................... 81 4.4.8 Method Summary........................................................................ 81 4.5 Risk Based Decision Making and Control Strategy............................ 83 4.5.1 Risk Based MCDM Design.......................................................... 83 4.5.2 Architecture of Risk Based Security Control............................ 86 4.6 Summary ................................................................................................ 88 CHAPTER 5: CLASSIC METHODS IMPLEMENTATION FOR RISK BASED MULTI-OBJECTIVE OPTIMIZATION .................89 5.1 Overviews of Classic Multi-objective Methods ................................... 89 5.1.1 Weight Method ............................................................................ 90 5.1.2 Constraint Method ...................................................................... 93 5.2 Risk Based Multi-objective Optimization Problem Implementation Using Linear Programming ............................................................... 94 5.2.1 Review of Linear Programming Problem, Algorithm and Application ...................................................................................... 94 5.2.2 Cost and Risk Objective Linearization ...................................... 99 v 5.2.3 Power Flow Modeling Using Shift Factor................................ 100 5.2.4 Security Constraint Linearization Using Distribution Factor 101 5.2.5 Linear Programming Method Implementation........................ 101 5.3 Case Study – Six Bus Test System .................................................... 102 5.3.1 Security Unconstrained OPF.................................................... 104 5.3.2 Security Constrained OPF.......................................................